Blogs | AlienVault
The AlienVault Blogs: Taking On Today’s Threats
Latest

The most recent posts from across the AlienVault blogs.

Subscribe: Via Email | RSS

Labs

Late-breaking discoveries and in-depth analysis.

Subscribe: Via Email | RSS

How-To

Practical, how-to advice, tips and guidance.

Subscribe: Via Email | RSS

A roundup of the week’s news, commentary, and observations.Pokemon Go has been all over the news this week, with initial reports of the app obtaining excessive permission, to reports of people being injured, or mugged by luring unsuspecting users.But this isn’t a new problem, simply a repackaging. Mobile apps are notorious for requesting excessive… Read more

Tags:

There is also a printable PDF version of the case study.Founded in 1893, the University of Wisconsin–Superior (UW-Superior) is a public university located in Superior, Wisconsin. UW–Superior grants bachelor’s, master’s, and specialist’s degrees. The university currently enrolls about 2,450 undergraduates and 150 graduate students from over 40 different countries. Ranked as 23rd by… Read more

Tags: siem, ids, usm, case study

Firewalls. We all have them. We all know we use them to keep unwanted stuff out of our networks. One thing we sometimes don’t think about is to whom our systems inside the network are talking.Why should we be concerned with what connections are being made from within our networks to the outside world? Data exfiltration, (malware… Read more

Tags: usm, firewall

Phishing is the little black dress of cyber-attacks: always in fashion, goes with anything, and, despite being around for over 20 years, still seems to be a hit. In fact, a recent experiment by JPMorgan showed that 1 in 5 employees will click on a phishing email.Even more troubling, a recent study by the Ponemon Institute showed that phishing can cost an… Read more

Tags: phishing, barkly

Before you read any further, I must caution you that the weaknesses described in this article impact multiple ECUs on the market today and therefore have had all identifiers, such as references to specific automobile and ECU manufacturers removed in the interest of responsible disclosure. While topics in this article will be discussed at a very superficial level, My talk… Read more

Tags: hacking, ecu, automobile attack vectors, rogue bts, electronic control units, dirtboxes

Get Email Updates

Labs Research
Security Essentials
All Blogs

Gartner MQ

Featured Content

Chat